If you really want to get down into the weeds and connect dots. From the Buzzfeed defamation lawsuit. No wonder Team Trump Treason was tweeting about McCain this weekend. And its starting to seem that there is more truth in the Steele Dossier than rumor. Connecting dots is fun boys and girls!

Conclusions
XBT and its affiliated web hosting companies have provided gateways to the internet for cybercriminals and
Russian state sponsored actors to launch and control large scale malware campaigns over the past
decade.158
Data provided by Bitly indicates that an XBT affiliate owned infrastructure was used to support the
malicious spear phishing attack of Democratic Party leadership in 2016 which resulted in the theft and
subsequent publication of highly sensitive information related to the Hillary Clinton presidential campaign.
Technical analysis of XBT infrastructure and U.S. government issued reports on Russian cyber espionage
tactics indicates that IP addresses owned by XBT were utilized by Russian civilian and military intelligence
services (RIS) to compromise and exploit networks and endpoints associated with the 2016 U.S. election.
Additionally, evidence suggests that COZY BEAR and FANCY BEAR, the Russian government affiliated APT
groups responsible for hacking the Democratic Party leadership, have used XBT infrastructure to support
other malicious activity.
Reputable private security firms have listed XBT infrastructure in a number of independent reports relating
to high profile malware campaigns, including attacks by Russian state actors. Those reports suggest XBT
infrastructure has been used to propagate malware, to attack the Ukrainian power grid, to engage in spear
phishing attacks, to deliver ransomware, to launch online advertising click-fraud theft schemes, and to host
botnets. Additionally, XBT has a public reputation for hosting malicious cyber activity. Media research
evidences multiple affiliates as being involved in adverse, malicious or criminal activity. More specifically,
XBT subsidiaries Webazilla, Webazilla BV and WZ Communications are cited in reputable publications as
known hosts of malicious activity; operators of botnet and command-and-control servers; and hosts of high
levels of Zeus botnet activity.

FTI’s findings illustrate a pattern that XBT infrastructure has been a resource for cybercriminals to launch
attacks without fear of repercussion, including specifically cybercriminals engaging in Russian state
sponsored malicious activities. Based on documentation produced during discovery and deposition
transcripts, Gubarev and other XBT executives do not appear to actively prevent cybercriminals from using
their infrastructure. Minimal, if any, investigations were performed by XBT when their infrastructure was
cited in high profile government or private security firm reports. For example, the first email
correspondence from XBT executives about the Root. S.A owned IP addresses noted in the Grizzly Steppe
report was sent in September 2017, almost nine months after the report was published.
Executed on the 25th day of May, 2018.

A Washingtontimes link that has the word ‘possibility’ in it. No thanks. How do these folks not see how they’re being duped into thinking Clinton is getting locked up? It’s always ‘soon’. It’s been ‘soon for what, three years?